default search action
29. ACSAC 2013: New Orleans, LA, USA
- Charles N. Payne Jr.:
Annual Computer Security Applications Conference, ACSAC '13, New Orleans, LA, USA, December 9-13, 2013. ACM 2013, ISBN 978-1-4503-2015-3
Distinguished practitioner
- William Young, Nancy G. Leveson:
Systems thinking for safety and security. 1-8
Mobile networks and apps
- Xiao Zhang, Amit Ahlawat, Wenliang Du:
AFrame: isolating advertisements from mobile applications in Android. 9-18 - Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos:
The man who was there: validating check-ins in location-based services. 19-28 - Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock:
Discovery of emergent malicious campaigns in cellular networks. 29-38
Privacy and privacy preserving technologies
- Luca Invernizzi, Christopher Kruegel, Giovanni Vigna:
Message in a bottle: sailing past censorship. 39-48 - Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras, Thorsten Holz, Evangelos P. Markatos:
k-subscription: privacy-preserving microblogging browsing through obfuscation. 49-58 - Min Li, Wanyu Zang, Kun Bai, Meng Yu, Peng Liu:
MyCloud: supporting user-configured privacy protection in cloud computing. 59-68
Malware
- Sirinda Palahan, Domagoj Babic, Swarat Chaudhuri, Daniel Kifer:
Extraction of statistically significant malware behaviors. 69-78 - Xin Hu, Kang G. Shin:
DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles. 79-88 - Dhilung Kirat, Lakshmanan Nataraj, Giovanni Vigna, B. S. Manjunath:
SigMal: a static signal processing based malware triage. 89-98
Cyberphysical systems (CPS) security
- Ryan M. Gerdes, Chris Winstead, Kevin P. Heaslip:
CPS: an efficiency-motivated attack against autonomous vehicular transportation. 99-108 - Stephen E. McLaughlin:
CPS: stateful policy enforcement for control system device usage. 109-118
Passwords and authentication
- Murat Akpulat, Kemal Bicakci, Ugur Cil:
Revisiting graphical passwords for augmenting, not replacing, text passwords. 119-128 - David Schmidt, Trent Jaeger:
Pitfalls in the automated strengthening of passwords. 129-138
Invited essayist
- Carl E. Landwehr:
A building code for building code: putting what we know works to work. 139-147
Applying/applied cryptography
- Behrad Garmany, Tilo Müller:
PRIME: private RSA infrastructure for memory-less encryption. 149-158 - Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi:
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications. 159-168 - Nathaniel Husted, Steven A. Myers, Abhi Shelat, Paul Grubbs:
GPU and CPU parallelization of honest-but-curious secure two-party computation. 169-178
Network security
- B. Amann, Robin Sommer, Matthias Vallentin, Seth Hall:
No attack necessary: the surprising dynamics of SSL trust relationships. 179-188 - Amir Herzberg, Haya Schulmann:
Socket overloading for fun and cache-poisoning. 189-198 - Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda:
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. 199-208
Systems security
- François Gauthier, Thierry Lavoie, Ettore Merlo:
Uncovering access control weaknesses and flaws with security-discordant software clones. 209-218 - Wai-Kit Sze, R. Sekar:
A portable user-level approach for system-wide integrity protection. 219-228 - Yangchun Fu, Zhiqiang Lin, Kevin W. Hamlen:
Subverting system authentication with context-aware, reactive virtual machine introspection. 229-238
Mobile systems security 1
- Mahmudur Rahman, Umut Topkara, Bogdan Carbunar:
Seeing is not believing: visual verifications through liveness analysis using mobile devices. 239-248 - Matthias Lange, Steffen Liebergeld:
Crossover: secure and usable user interface for mobile devices with multiple isolated OS personalities. 249-257 - Collin Mulliner, Jon Oberheide, William K. Robertson, Engin Kirda:
PatchDroid: scalable third-party security patches for Android devices. 259-268
Hardware and virtualization security
- Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero:
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives. 269-278 - Jonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik-Oliver Blass, Aurélien Francillon, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas:
Implementation and implications of a stealth hard-drive backdoor. 279-288 - Zhui Deng, Xiangyu Zhang, Dongyan Xu:
SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization. 289-298
Mobile systems security 2
- Felix Rohrer, Yuting Zhang, Lou Chitkushev, Tanya Zlateva:
DR BACA: dynamic role based access control for Android. 299-308 - Jannik Pewny, Thorsten Holz:
Control-flow restrictor: compiler-based CFI for iOS. 309-318 - Giovanni Russello, Arturo Blas Jimenez, Habib Naderi, Wannes van der Mark:
FireDroid: hardening security in almost-stock Android. 319-328
Web and cloud security
- Yogesh Mundada, Anirudh Ramachandran, Nick Feamster:
SilverLine: preventing data leaks from compromised web applications. 329-338 - Jordan Wilberding, Andrew Yates, Micah Sherr, Wenchao Zhou:
Validating web content with senser. 339-348 - Mohsen Zohrevandi, Rida A. Bazzi:
Auto-FBI: a user-friendly approach for secure access to sensitive content on the web. 349-358
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.